EU INTERNAL MARKET AND CRIMINAL LAW ISSUES. Vyacheslav Tulyakov



Similar documents
Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Opinion Statement of the CFE. on the proposed Directive. on the fight against fraud to the EU s financial interests. by means of criminal law

EUROPEAN UNION COMMON POSITION ON UNGASS 2016

Business Plan 2012/13

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

For most countries, money laundering and terrorist financing raise significant

Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice

The UK cyber security strategy: Landscape review. Cross-government

Cybercrime: risks, penalties and prevention

In an age where so many businesses and systems are reliant on computer systems,

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud

S. ll IN THE SENATE OF THE UNITED STATES

T-CY Guidance Note #4 Identity theft and phishing in relation to fraud

EY Cyber Security Hacktics Center of Excellence

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

ATO Submission Inquiry into penalties for white collar crime

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Cybercrime in the Automotive Industry How to improve your business cyber security

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

esoft Technical White Paper: Who Needs Firewall Protection?

AN INTEGRATED APPROACH TO COMPLIANCE AND RISK MANAGEMENT IS THE BEST WAY FORWARD BY MARTIN WOODS OCTOBER 2011

UNITED NATIONS CONVENTION AGAINST CORRUPTION Implementation of article 33 in the Romanian legislation

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

The European Response to the rising Cyber Threat

An introduction to the FATF and its work

Recovering Your Identity. Advice for victims of identity crime

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

Honourable members of the National Parliaments of the EU member states and candidate countries,

CYBER CRIME AWARENESS

AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

SECTION 8 GARDA SÍOCHÁNA ACT General Direction No. 2

A strategic approach to fraud

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

MEXICO S CRIMINAL JUSTICE SYSTEM A GUIDE FOR U.S. CITIZENS ARRESTED IN MEXICO

Home Security: Russia s Challenges

Real world cyber crime cases

The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT

Online grooming: What changes with the new legislation?

An Overview of Cybersecurity and Cybercrime in Taiwan

STATEMENT OF JOSEPH S. CAMPBELL ASSISTANT DIRECTOR CRIMINAL INVESTIGATIVE DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

Analysis of the act on electronic signatures

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

IT Security Management 100 Success Secrets

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

CHAPTER 10: COMPUTER SECURITY AND RISKS

Cyber Crimes in India A Closer look

I. Background information

Washington, D.C. June 24, for the opportunity to testify today. I would like to share with you the perspective of state

Indicators for Banks to Assist in Identifying Suspicious Transactions

Topic. Layout. IELTS writing (Level 2 - Level 4) Write 250 words on the following topic

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, June 2006)

Arkansas Emergency Department Opioid Prescribing Guidelines

PART 3 The Basics 10

Clause 2 of Article 96 of the Law of Ukraine On the Rules of Procedure of the Verkhovna Rada of Ukraine. 3

SUPPLY CHAIN INTEGRITY AND SECURITY

CYBER RISK SECURITY, NETWORK & PRIVACY

How To Prevent An Sql Injection Attack

This letter is to provide you with our views on the minimum criteria for the impact assessment and subsequent legislative proposal.

Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.

A tool for small-to-medium sized businesses. Anti-Money Laundering and Counter-Terrorism Financing Act 2006

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

Securing Critical Information Assets: A Business Case for Managed Security Services

Human Resource Management. 1 Human Resources Management

DECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM

FINAL // FOR OFFICIAL USE ONLY. William Noonan

How To Cover A Data Breach In The European Market

Juvenile Justice. CJ 3650 Professor James J. Drylie Chapter 3

Competition policy and Law in Nepal.

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Opinion of the International Juvenile Justice Observatory

ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive

Resolution adopted by the General Assembly on 8 September [without reference to a Main Committee (A/60/L.62)]

APPENDIX THE EUROPEAN LOTTERIES SPORT CHARTER 2012

MISION PERMANENTE DEL PERU ANTE LAS NACIONES UNIDAS

Transcription:

EU INTERNAL MARKET AND CRIMINAL LAW ISSUES Vyacheslav Tulyakov

THE GLOBAL RISKS OF THE WORLD ECONOMIC FORUM AND THE OBJECTIVES OF CRIMINAL POLICY On 22 January 2014 the World Economic Forum was opened in Davos. Traditionally, several days before its opening a group of experts (over 700 people) publishes a special report on the prognostic characteristics of the main risks which may essentially influence the world economic, political and social development.

The most significant ones are: The financial crisis in the economics of the world s leading countries The high level of unemployment The lack of water resources The disproportion in income distribution among population The failure of the policy of adaptation to the climate change A high probability of negative weather cataclysms. The failure of the policy of global governance The food crisis The failure of the system of main financial mechanisms and institutes The high level of political and social instability. Some of the highlighted factors may be divided into systemic groups; a number of them is and will be making substantial impact on the criminal policy.

The first group includes factors connected with the instability in the rapidly growing worldwide multipolarity. This concerns not only the global economic imbalances, the criminality of which hasn t been studied enough. It is known that the changes in social, political and cultural ties and processes lead not only to positive results but also to the rise of poverty and social oppression, marginalization, i.e. processes of a high criminal menace. Along with that, the diversification of ties and economic possibilities opens a way for the growth of criminal practices, the formation of new potentials for the development of organized criminal activity.

Concerning EU market protection issues we used to pay attention to the problems of illicit traffic in narcotic drugs, weapons, trade in human beings, nowadays attention is attracted to the world market of adulterate medicines, pirate trade of manufactured goods and foods, abuse in stocks issue and circulation and in the process of brokerage, dealer and management activity. The criminal practices that have been shaped in the mentioned spheres have obvious signs of the organized ones

EU FEARS regionalization of crime is an important tendency, as the changing social and demographic conditions in the world and the growth of national middle class, regional authorities and interests lead to minimization of the system of multinational global government and its influence on the regional economies. It may lead to the weakening of legal regulators on international, supranational and supernational levels, and, as a result, to replacement of these positions by criminally oriented structures in the spheres of public health (trade in adulterate medicines), financial services (fake financial brokerage, fraudulent financial practices), energy sector (cartel deals). Such a changeable business landscape will naturally cause successive growth of corruption in state structures.

CRIMINALIZING Insider dealing occurs when a person who has price-sensitive inside information trades in related financial instruments. Market manipulation takes place when a person artificially manipulates the prices of financial instruments through practices such as the spreading of false or misleading information and conducting trades in related instruments to profit from this. Together these practices are known as market abuse.

CONTROL Market Abuse Regulation adoption of common minimum rules on criminal law when this proves essential to ensure the effective implementation of a harmonised EU policy. Current sanction regimes applied in the Member States for market abuse offences have proven not to be sufficiently effective. They do not always use the same definitions of these crimes and are too divergent, allowing perpetrators to benefit from loopholes

THE LOST GENERATION A huge number of people, having graduated prestigious and high-paid institutes of higher education, are obliged to change their profession due to the absence of vacancies of labor market. Such a social dissatisfaction in the whole world servers as a nutrient medium for the forming of groupings of extremist orientation, terrorists and ordinary offenders. In this relation, along with the acts of misuse of law becoming more frequent, the law nihilism, the breach of traditional ties and relations, a high level of frustration of this social group,

NEW WAY OF CRIMINAL TRADE a concept of gradual rise of the cases of kidnapping attracts more attention Kidnapping may have several aims, from simple lucre to revenge to the powerful ones, urge for self-expression, or financing organized crime (right up to the terrorist groupings).

ID THEFT ISSUES The third group of risks lies in digital disintegration. Nowadays in the world of cyber communications, attacking is easier than guarding oneself. The systems of defense against invasion of secrecy of private life and correspondence do not exist. States and individuals, corporations and social groups enter the Internet with the purpose of capturing and collection of personal data and communications as well as organizing illicit business. Thereupon, the system of protection of the unified cyberspace needs to have a global nature. Resolving the issues on supranational level is no longer enough here.

Common EU minimum Criminal Law standards Adoption of common minimum rules on criminal law due to harmonised EU policy principles necessity proportionality subsidiarity.

THANK YOU Vyacheslav Tulyakov, LL.D., professor Vice-rector, Head of Criminal Law Department National University "Odessa Law Academy", 23, Fontanskaya doroga, Odessa, 65009, Ukraine